Cryptography Reference
In-Depth Information
Note that this denition is dierent from that in Naor and Shamir's model.
Suppose that C
1
and C
2
are the two encoded shares produced by some (2,
2)-VCS using basis matrices M
0
and M
1
with respect to binary image B.
Then the security condition in (2, 2)-VCS is w(M
b
[1]) = (M
b
[2]) for b 2
f0, 1g where M
b
[i] is the ith row of M
b
for i 2 f1, 2g, while the contrast
condition becomes w(M
1
[1] or M
1
[2]) (M
0
[1] or M
0
[2]) > 0. Let c
1
in C
1
and c
2
in C
2
be the corresponding pixels of b in B. Let d = c
1
c
2
where d
is in D = C
1
C
2
. Let b(0) (b(1)) denote the pixel of b = 0(1) and d[b(0)]
(d[b(1)]) denote such d corresponding to b(0) (b(1)). Since each b = 0 (1) is
encoded according to M
0
(M
1
), the contrast condition in (2, 2)-VCS assures
w(d[b(1)])w(d[b(0)]) > 1 so that d (1) can be identied from d (0) for all d(0)'s
and d(1)'s in D. However, VCRG only demands
T
(S[B(0)])
T
(S[B(1)]) > 0,
or equivalently,
t
(s[b(0)])
t
(s[b(1)]) > 0.
7.3.2 (2, 2)-VCRG Algorithms for Binary Images
Let random pixel (0, 1) be a function that returns a binary value 0 or 1 to
repr
esent a
transparent or opaque pixel, respectively, by a coin-flip procedure
and R
1
[i;j] denote the complement of R
1
[i;j]. Each of the following three al-
gorithms successfully encodes a secret binary image B into two random grids
R
1
and R
2
which constitute a set of (2, 2)-VCRG.
Algorithms 1{3. Sharing a binary image by two random grids
Input: A w h binary image B where B[i, j ] 2 f0, 1g (white or black),
16i6w and 16j6h
Output: Two shares of random grids R
1
and R
2
which reveal B when su-
perimposed where R
k
[i, j ] 2f0, 1g (transparent or opaque), 16i6w, 16j 6h
and k 2f1; 2g
Encryption(B)
Algorithm 1.
1.
Generate R
1
as a random grid,
(R
1
) = 1=2
// for (each pixel R1[i,
1
[i;j], 16i6w, and 16j6h) do
//
T
R
1
[i;j] = random pixel (0, 1)
2.
for (each pixel B[i, j ], 16i6w and 16j6h) do
2.1
if if (B[i, j ] = 0) then R1[i,
2
[i;j] = R
1
[i;j]
else R1[i,
2
[i;j] = R
1
[i;j]
g
3.
output(R
1
, R
2
)
Search WWH ::
Custom Search